-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
= =
- WELCOME TO THE NINETEENTH ISSUE OF -
= =
- -=>PHANTASY<=- -
= =
- A PUBLICATION AND NEWSLETTER OF -
= =
- THE -
= INTERNATIONAL =
- INFORMATION -
= RETRIEVAL =
- GUILD -
= =
- Hacking,Phreaking,Anarchy,Survivalism,Commentary -
= =
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Volume Number Four,Issue Number Nineteen Dated 10/24/93
Editor is Mercenary : mercenar@works.UUCP
Article Submissions: The Mercenary/IIRG
862 Farmington Avenue
Suite 306
Bristol,Ct 06010
IIRG World Headquarters BBS: The Rune Stone
14.4K HST Courier
All H/P/A, 3000+ Files
(203)-832-8441
NUP: Conspiracy
Table of Discontents:
[1] IIRG Analysis of Police Statement
By: The I.I.R.G.
[2] Section 2: FREE IONIZER FUND!! (Please Help)
[3] PUMP-CON II (A Bust Waiting to Happen)
By: Saint Anarchy
[4] Tactical Radio Communication Equipment
By: Thomas Icom/IIRG
[5] DATA BANK OF THE GERMAN SPEAKING AN-ARCHISM
From: Adamantios Diamantidis
[6] Phortune 500 Returns!
By: The Renegade Chemist
Data Security Consultants, Inc./Online Services
[7] The Rumor Mill (Unconfirmed Rumors From the Underground)
Edited By: Mercenary
1. DEF CON II (Early Notices)
2. "IONIZER" Anarchy Series?
3. HoHoCon'93
4. IIRG Zine Watch
[8] PHANTASY TIDBITS: News and Views of Interest
1. FBI Director to Head Criminal Probes
2. Man Involved in ATM Scam Pleads Guilty to
Fraud in Other Cases
3. FBI Operation Targets Thefts and Fraud at IBM
4. Redding Connecticut Man Indicted in Computer Porn Case
[9] Listing of IIRG Distribution Sites
[10] Listing of PHANTASY Distribution Sites
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
OFFICIAL DISLAIMER...
All information in PHANTASY is from USER contributed material
The Publishers and Editors of PHANTASY and THE IIRG disclaim
any liability from any damages of any type that the reader or
user of such information contained within this newsletter may encounter
from the use of said information. All files are brought to you for
entertainment purposes only! We also assume all information infringes
no copyrights and hereby disclaim any liability.
PHANTASY is (C) 1990 by The IIRG
IIRG and INTERNATIONAL INFORMATION RETRIEVAL GUILD is (C) 1982
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [1]: IIRG Analysis of Police Statement
By: The I.I.R.G.
The following is an IIRG Analysis of Officer Richard Aniolowski's unsworn
statement, which we find is full of errors and inconsistantcies.
We provide it here as further proof of the incompetant and callous manner
in which the West Hartford Connecticut Police Department is handling
Mike Elanskys case.
Paragraph 1:
That I, Richard Aniolowski, am a member of the West Hartford
Police Department and have been for ten years and 7 months
and was promoted to Detective in September 1990.
IIRG Analysis:
This is probably the only paragraph in this whole document that
we don't have an argument with.
Paragraph 2:
That on June 14, 1993, assistant state's attorney, Joan
Alexander GA 14 assigned me to assist her in an
investigation of a computer bulletin board that is
disseminating information on how to manufacture explosives,
bombs, and how to evade bomb squad technicians when they
attempt to disarm such devices. The information included
explicit and ((sic)) instructions on how to construct such
devices with only laymans knowledge, and involved the
promotion and encouragement of constructing such devices for
purpose ((sic)) of "maiming or mortally wounding" law
enforcement officials.
IIRG Analysis:
The IIRG has carefully screened the two files in question
that the police are using against Mike, they are...
Anarchy for Fun and Profit (Volume 1,Issue 1)
Anarchy for Fun and Profit (Volume 1,Issue 2)
Now other than the tongue in cheek disclaimers at the beginning
of the files,
Issue 1
/--------------------------------------------------\
! Note: !
! To any Law Enforcement agency: !
! FUCK OFF! This file is intended to promote !
! General havoc and *ANARCHY* , and you cant !
! do a god damn thing about it, PIGS. !
\--------------------------------------------------/
Issue 2
/--------------------------------------\
! Note to Law-enforcement type people: !
! This file is intended to promote !
! general havoc and *ANARCHY*, and !
! since your going to be the first !
! assholes up against the wall.. there !
! isnt a damn thing you can do about !
! it, pigs! !
\--------------------------------------/
We can find no mention of "how to evade bomb squad technicians"
or encouragement of "maiming or mortally wounding" law enforcement
officials." This claim is totally fictitous.
Paragraph 3:
That presently Michael Elansky has a court appearance for
violation of probation. This probation is the result of an
arrest for manufacturing explosives. In October, 1992,
Michael Elansky was arrested for a burglary at Hall High
School in which several dangerous chemicals were stolen. The
chemicals stolen were sulfuric acid, hydrochloric acid and
nitric acid. All of these chemicals can be used to
manufacture explosives. That it was on May 28, 1993 that
Detective Goodrow of the Hartford Police Department gained
access to the "Warehouse", a modem accessible computer
bulletin board that can be reached over regular telephone
lines, ((sic)) The Warehouse is operated and controlled
solely and exclusively by Michael Elansky. Elansky as the
operator of the bulletin board system (BBS), is the only
person who can delete files from the bulletin board, and is
the only person who can determine which user may access the
system and what level of access they may obtain. The user in
this case were ((sic)) carefully screened and were required
to make application to Elansky in order to be allowed
access.
IIRG Analysis:
Mike has had problems with the law in the past, this we are not
disputing. But we really wish the police and media would not
over-exagerate the facts. Here is what we really know,
1. The Media claims that Mike was arrested for "having weapons
in a vehicle and carrying a pistol without a permit"
Had they checked the facts of the matter, they would have
found out that this "Pistol" was in fact a BB Gun.
2. The Police cite Mikes arrest for "for a burglary at Hall
High School". Now notice they forget to mention in this
statement that the robbery was really carried out by two
teenagers and not by Mike.
They vainly tried to link him to the robbery and the charges
were going to be dismissed the day of his arrest for this
travisty of justice.
3. In this document the police claim "several dangerous chemicals
were stolen. The chemicals stolen were sulfuric acid,
hydrochloric acid and nitric acid.
All of these chemicals can be used to manufacture explosives."
Now the IIRG has taken a look at this list and would like to
ask why the police also didn't mention that these "dangerous"
chemicals are all easily obtainable at your local hardware store
or chemical supply house.
And please notice that they have a wide variety of uses and lets
get these products off the shelf at Home Depot and Ace Hardware
if their so dangerous!!
Lets examine the list,
Sulfuric Acid(Oil of Vitroil) - commonly available at any well stocked
hardware store or automotive store.
Used in Car Batteries,Storage Batteries,
in electroplating,refining copper and
silver, and in pickling iron.
Hydrocloric Acid(Muriatic Acid)- commonly available at hardware stores and
large department stores.
Used in cleaning concrete,brick,ceramic
tile and metal. Also used for making glue,
glucose and gelatine. Used for making
chlorine in the laboratory.
Nitric Acid - commonly available at chemical supply
outlets and small hobby shops.
Used in making fertilizer,artificial silk
(Rayon),dyes,celluloid, and to seperate
gold from silver.
Now lets look at the Police Departments claim "That it was on
May 28, 1993 that Detective Goodrow of the Hartford Police
Department gained access to the "Warehouse", a modem accessible
computer bulletin board that can be reached over regular telephone
lines"
Ok sounds simple enough? but we've carefully gone through Mikes
sysop log for May 28th,1993 and can find no record of a new user
logging on that day. If as they claim, he did log on to the
system on May 28th,1993 he was not using an authorized account
and he is guilty under Connecticut General Statutes,
SECTION 53a-251 Computer Crime
(a) Defined. A person commits computer crime when he violated
any of the provisions of this section.
(b) Unauthorized access to a computer system. (1) A person is
guilty of the computer crime of unauthorized access to a
computer system when, knowing that he is not authorized to
do so, he accesses or causes to be accesses any computer
system without authorization.
We would request that proper authorties immediately take this
dangerous computer cracker (Detective Goodrow) into custody
and prosecute him to the full extent of the law.
Its individuals like him that give "real hackers" a bad name.
The police also claim that "The Warehouse is operated and
controlled solely and exclusively by Michael Elansky.
Elansky as the operator of the bulletin board system (BBS),
is the only person who can delete files from the bulletin board,
and is the only person who can determine which user may access the
system and what level of access they may obtain. The user in
this case were ((sic)) carefully screened and were required
to make application to Elansky in order to be allowed access."
Once again, we must shed a little light into this apparent
dark closet of injustice. What the police failed to realize
is that Mike had very little to do with daily upkeep of the
Ware House and had numerous co-sysops to help him with the
daily maintenance of the system.
I hope the Law Enforcement agencies involved wouldn't handle
a murder case in the same way in which they are apparently
bungling through this case.
Paragraph 4:
The computer bulletin board in this case originates from the
computer of Michael Elansky in the home of Michael Elansky
((address deleted)), West Hartford, Ct. Elansky being
the authorized user of the bulletin board had a code name
that identified him to the users of this bulletin board. The
code name used by Elansky is "IONIZER."
IIRG Analysis:
Ok they got the first part correct, Mike did own the computer
but the house belongs to his parents.
Mike was the Sysop of the Ware House, not the "authorized user"
And yes his handle was "IONIZER"
Paragraph 5:
That Goodrow said the "Anarchy'" ((sic)) file he obtained
through access to the Warehouse bulletin board through one
of the users systems.
The file Anarchy that Goodrow accessed gave detailed
instructions on how to manufacture explosives, bombs and
went on to instruct the reader on how to evade police bomb
squads in dismantling of bombs.
IIRG Analysis:
At NO TIME by Mikes logs did Detective Goodrow ever download this
file unless he was using an authorized users account.
At which point he would be guilty under SECTION 53a-251.
As we have stated in an earlier article, only 2 users have ever
downloaded ANARC2.ZIP that we could find.
1. HITMAN
18:56 05/23/93 LIBRARY FILE DOWNLOAD
User Hitman download ANARCHY\ANARC2.ZIP
2. HOLLYWOOD
14:35 05/24/93 LIBRARY FILE DOWNLOAD
User Hollywood download ANARCHY\ANARC2.ZIP
14:50 05/24/93 LIBRARY FILE DOWNLOAD
User Hollywood download ANARCHY\ANARC2.ZIP
And as you can plainly see by the date stamp, these two dates fall
several days earlier than the May 28th date quoted by this document.
If Detective Goodrow had downloaded the file at all, why would the
police try to obtain a copy of the file from Hitman as he stated
to us in the following letter,
Quote from Hitman -
Date : 08 Aug 93 10:19:14
I'll tell you the whole story, as I told it to Ionizer
last night (he called me from jail). When I was out one
day, the detective Mr. Anielwiski (or something like that)
called. I wasn't home, so, he talked to my dad. My dad
thought I was doing all of this shit too, so, he took it
way out of proportion. I got home, and he made me search
for a file 'ANARC.*' on my hard drive. Since it is
really his computer and his phone line, there is nothing
that I could have done, since he could have easily done
it himself. Anyways, he said to delete it, so I wiped it
via Norton's WIPE program, so it couldn't be recovered.
Anyways, I guess the detective called back, and my dad said
that I had the file. But, it was wiped. Anyways, my dad
thought we'd just undelete it, but, he didn't realize that
the file would just be a null file when we did so. The
rest of the story is what he told me, as I was at work the
rest of the day. The detective came over, and I guess my
dad copied the null file onto a floppy, but, I think the
floppy was bad anyways. At any rate, to my knowledge, there
is no information at all on the floppy, and, I've got no other
copy of it on my hard drive.
--Hitman
I hope this will show our point that Mike is apparently being
railroaded by the Police Department who seems to hold a personal
vendetta against him. As for Hollywood, Mike tells us that the
police have not contacted him.
Paragraph 6:
That I supplied a photocopy of the file that Detective
Goodrow downloaded from Michael Elansky Warehouse Bulletin
Board.
Some authorized users of Michael Elansky's are minors, a
fact known to Elansky since he required that name, address
and age prior to being allowed to access the bulletin board.
The phone number used by Detective Goodrow to access
"Warehouse" Bulletin Board put out by Elansky ((number
deleted)). I obtained from SNETCO Security that the
phone line belongs to Michael Elansky (address deleted)),
West Hartford, CT.
IIRG Analysis:
If as we assume, the police obtained the file from some other
system, this case should be thrown out immediately.
As for Mike knowing everyones identity, as any good sysop knows
users constantly lie about their identities and ages.
Some through fear of stupid Police State actions such as this
little bizarre episode and some people just like to keep
a little privacy in their lives, and we can respect that.
Mikes system was clearly labeled as a "Private and Confidential" system.
I dont think the local West Hartford,CT chapter of the Knights
of Columbus would like it if they were raided during an
initiation ceremony and charged with risk of injury since they
are known to use fake guns in their initiation ceremony.
But alas, since they are known as a "private" club, the police would
never dare to raid them. (Not to mention 1/2 the members are cops).
Sounds like a contradiction in terms to us..
But since Mike is just a 21 year old, and doesn't have "political"
clout, he may be harassed at will.
Paragraph 7:
((name deleted)) of Bloomfield, a University of Hartford
student, and a user of bulletin board says the person who
runs the bulletin board identifies himself as the "IONIZER"
and is a student of The university of Hartford.
On June 20, 1993 I interviewed and obtained a written
statement from ((name deleted)) of East Hartford,
he is 14 years of age. He said he has spoken with Michael
Elansky by phone on several occasions.
Several hours after speaking with ((name deleted)) I
received a phone call from Michael Elansky asking why I was
investigating him.
That ((sic)) I spoke with ((name deleted)), 17 years
of age who downloaded but deleted.
((name deleted)) of Newington downloaded "ANARCHY" from
the warehouse bulletin board. The material was downloaded onto a
floppy disc for the police department.
Elansky does promote, encourage and praise the manufacture
of explosives such as pipe bombs and goes one step further
in promoting techniques on how to evade, injure and kill
bomb technicians attempting to neutralize the bomb.
_EXCERPTS_
To any law enforcement agency "FUCK OFF this file is
intended to promote general havoc and *ANARCHY*, and you
can't do a damn thing about it PIGS...instructions of making
pipe bombs. materials needed 6" pipes, drill
((CuD Moderators' Note: Were "instructions" withheld?))
That in October 1992 the West Hartford Police Department
conducted a search warrant at the home of Michael Elansky.
The seizure included, pipes, approximately 6" long that had
been capped and had been drilled into.
Issue warrant...violation of Section 53a-179a inciting
injury to persons or property and 53-21 risk of injury to a
minor. dated July 26, 1993
IIRG Analysis:
Now the above paragraph just re-hashes the same old BS over and over,
the Police tried to obtain the file from outside sources.
If they had downloaded the files themselves, why would they need
to obtain it elsewhere?
Show us where Mike has ever encouraged others to make pipe bombs..
Did He take out an ad in the Hartford Courant.... NO!
Did He have his own TV Show, "Bombing With Mike"... NO!
Does he pass out "Bomb Making Leaflets at School.... NO!
So just where does he go and make these Praising Statements??
Your Guess is as Good as Ours... Since its Police Propaganda!
FREE IONIZER - THE IIRG 1993
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [2]: FREE IONIZER FUND!! (Please Help)
////// ////// /////// ////////
// // // // //
// // /////// // ////
// // // // // //
////// * ////// * // // * ///////// *
The International Information Retrieval Guild's
FREE IONIZER FUND
Buy His Freedom, Stop Government Censorship!
As many of you may already be aware, Ionizer - an IIRG Site Sysop has been
arrested by the West Hartford,Connecticut Police Department.
We would ask you to donate whatever you can afford to his legal defense.
All funds collected will be used for Mike's defense and no other purpose.
Mike's bond has been set at $500,000 Dollars and his legal fees have already
amassed to over $15,000 Dollars.
Since Mike's only crime is having "Anarchy" files online for his users
downloading pleasure. We feel that winning this case is of the upmost
importance to all of us in the telecom community.
If we do not stop the government in its attempts to censor the public,
we have abandoned what it truly means to be a Freedom Loving American.
Send Whatever you can to:
FREE IONIZER
C/O David Elansky
25 Maiden Lane
West Hartford,Connecticut 06117
Make Checks or Money Orders Payable to Michael Elansky (Ionizer)
This way we are assured all money goes directly to his defense
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [3]: PUMP-CON II (A Bust Waiting to Happen)
By: Saint Anarchy
Many of you may have seen the Announcement that was placed in (CUD),
Computer Underground Digest and distributed as a flyer in several locations
for the Computer Conference - "PUMPCON II".
We would like to take this time to Warn anyone planning to attend this
Conference that we've learned through several sources that this Conference
is already known to the Philadelphia Police.
The IIRG has learned that the Greenburgh, New York Police Department has
notified Philadelphia Police to watch the Conference and they are
currently planning to raid the Conference at the first sign of any
improprieties.
We found it interesting that the main Planner of this conference,
"IXOM CODEX" (who Phantasy Magazine readers should know well enough by now)
posted in the flyer that "Anyone interested in the Computer Underground
except IIRG Members" was welcome to attend.
This would of course be in reference to the many articles where the IIRG
has warned you of this individuals selfish acts of betrayal and jealousy.
This of course to us only further confirms the many allegations that "IXOM
CODEX" is an informant.
We also found it interesting that the flyer claims "proceeds above the
Conference costs will be used to help the victims of last years conference",
Since the only real arrest was that of "IXOM CODEX", (whos case has still not
gone to trial) and he is the main planner of this years conference.
It appears that PUMPCON II is just a ruse to fill Ixom's wallet and this
Conference should really be called "RIPOFF II".
Here is the ad thats being distributed, and we would strongly urge all
individuals "DO NOT ATTEND THIS CONFERENCE!" for you own safetys sake.
You are hereby cordially invited to attend the,
Second Annual PumpCon II Conference.
Just mail your name/handle, group (if any), home state to:
pumpcon@phantom.com
It is necessary that you do mail this account so we know you are coming!
PumpCon FAQs (Frequently Asked Questions)
This file is being written in response to all of the questions that I
have been bombarded with. Hopefully it will clear up any confusions
that obviously must exist.
1. When is PumpCon?
PumpCon II will be held Halloween Weekend 1993, October 29, 30, 31.
2. Where is PumpCon?
PumpCon II will be at the Airport Comfort Inn, in Filadelfia,
Pencilvania. Get the PumpCon information file for further details.
3. Can I bring my computer?
Of course you can bring your computer (Computers are not illegal!),
until such time as owning/possessing a computer is illegal.
4. How much are hotel rooms?
Hotel rooms range from around $50/night to $100/night in the hotels
that have been selected for this years PumpCon. The PumpCon
information file gives further details about the hotels.
5. Who is going?
This is a question that really can't be answered until PumpCon.
6. Who is going to speak?
This is also going to remain sekret until the event for security reasons.
7. Why go to PumpCon?
I don't know, if you asked or even thought of that question, don't
bother to show. You obviously can't add to the conference.
8. What should I bring?
Why/How should I know, again to ask such a question shows you
obviously aren't needed.
9. Is Law Enforcement going to be there?
This answer is not known at this time, but they are welcome, with an
admittance fee double that of civilian attendees.
10. Is there going to be alcohol/drugs?
These substances will not be provided by the conference or any of the
organizers, does that answer your question?
PumpCon II
-- The Woodstock of Computer Conferences --
WHO: Anyone interested in the Computer Underground except IIRG Members :OHW
WHAT: A weekend of Telephony & Computer Seminars, and PARTYING! :TAHW
WHEN: October 29, 30, and 31 (Fri, Sat, Sun) Halloween Weekend 1993 :NEHW
WHY: To meet all of those people you have spoken to, but never met. :YHW
WHERE: Airport Comfort Inn, Filadelfia, Pencilvania :EREHW
DESCRIPTION
A gathering of computer enthusiasts for a weekend of FUN! Guest
speakers will also be present to speak about the latest in computer
security developments.
Come join us for our second annual Halloween Party.
COST
Your $20.00 admission fee will cover all of the conference functions and a
name badge with yourHandle, Group Affiliation, and home state.
This is a non-profit conference, any proceeds above the conference costs
will be used to help the victims of last years conference.
HOW TO GET THERE
The convention will be located just 3 miles from the Philadelphia
International Airport at the Airport Comfort Inn. Two other hotels
are available within the same area.
Knights Inn Red Roof Inn Comfort Inn
43 Industrial Highway 49 Industrial Highway 53 Industrial Highway
Essington, PA 19029 Essington, PA 19029 Essington, PA 19029
Phone: (215) 521-6650 Phone: (215) 521-5090 Phone: (215) 521-9800
Fax : (215) 521-8846 Fax : Ext. 444 Fax : (215) 521-4847
I-95 North or South
The hotels are located off I-95 exit 9A on Route 291 (Industrial Highway).
From north or south at the traffic signal turn right and continue for about
500 yards, the hotels are on the right side of the road.
Airport
There is a FREE shuttle available to all of the hotels.
FOR MORE INFORMATION
Mail:
PumpCon II
P.O. Box 617
Plantsville, CT 06479
E-Mail:
pumpcon@mindvox.phantom.com
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [4]: Tactical Radio Communication Equipment
By: Thomas Icom/IIRG/Cybertek
Reliable communications equipment is essential to any group's
activities, whether you're doing a simple trashing run, or coordinating the
defense of an area. Fortunately, there exists a wide range of readily
available, inexpensive equipment so even "technologically challenged"
organizations can play.
All the equipment mentioned is available at your local Radio Shack, so
procurement won't be a hassle. While not "state of the art" by any means,
it nevertheless still works. If you need something more advanced, then
either recruit a commo specialist, or learn yourself.
We'll start with CBs. CBs have 40 channels available for use, and are
available anywhere. With a standard 3-5 watt handheld, you can expect a 1-5
mile range, occasionally reaching out to 20 miles or more. With a better
antenna (base station), you can expect a maximum reliable range of 20-30
miles, depending on terrain and interference from other stations.
The main problem with CBs is that everyone has one. As a result,
security of unencrypted communications is lacking, and interference can be
severe. The interference problem can work to your benefit, however, by
hiding your group's communications. If you use a good code to make your
group's communications sound like all the other CB'ers in your area, your
communications will be quite secure. Another advantage of CB's common
availability is that possessing them raises no eyebrows.
If you start with some better quality CBs, and then acquire a commo
specialist or some commo knowledge, you can modify your equipment for higher
power output and more channels. This will increase your range and security.
Another good-entry commo unit, suitable for intra-group communication
while on a "run", are the 49 Mhz. headset/"hands-free" units. They are
inexpensive, and typically have a 1/4-1/2 mile range. These are good to
give to each member of the team so you all stay in touch should you loose
visual contact of each other. Their short range offers good security for
tactical purposes, but you might have interference problems in suburban or
urban areas because they use the same frequencies as cordless phones and
wireless "baby monitors". If you decide to purchase some of these units,
make sure you get the ones with multiple channel capability, such as the
Radio Shack #21-407.
Taking a step into more professional equipment, there are the VHF and
UHF business band handheld radios. These radios have anywhere from one to
six (or more) channels, and put out one to five watts. With a five watt
radio and a decent antenna, you can easily achieve a 50 mile range under the
right conditions. They also use FM transmission as opposed to CB's AM mode,
resulting in a clearer signal.
They are not without their disadvantages. For starters they are
expensive. Low end units start at $100 apiece. The off-the-shelf units are
also equipped with common low-power frequencies called "garbage channels" by
certain individuals in the industry. In a lot of areas these frequencies
are as bad as CB. One such frequency, 154.6 Mhz, (Which incidentally is
also the frequency that comes with The Radio Shack VHF Handheld.) is
commonly used by McDonalds for their order windows. While one can change
frequencies, this does take some electronics knowledge, or the assistance of
a technician. Again unless you have a cool friend in the industry, this
might be a problem, as most shops won't change crystals unless you are
licensed for the frequency.
If you spend more money, you can get user-programmable radios that are
more versatile. You'll then be able to find a nice quiet channel somewhere
for your activities. Programmable radios start at about $300 a piece.
One thing you should definitely NOT DO is get some ham rigs and start
operating on ham frequencies. Hams are a territorial lot, and if they
suspect unlicensed operation on their frequencies they will track it down
just for the hell of it.
One thing you should definitely do is use a verbal code system when
transmitting. This will greatly improve your security no matter what type of
communications you use. Avoid using things like Pig Latin, or words that
realistically describe your group.
This article just barely scratches the surface of this topic.
If you're interested in further info, send us mail on the Rune Stone.
I also suggest getting a copy of the ARRL Amateur Radio Handbook from the
American Radio Relay League, Newington, CT. It contains a wealth of
information; although you'll need some electronics knowledge to understand
the material.
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [5]: DATA BANK OF THE GERMAN SPEAKING AN-ARCHISM
From: Adamantios Diamantidis
DATA BANK OF THE GERMAN SPEAKING AN-ARCHISM
The Da.d.A. Project
DAtenbank des Deutschsprachigen Anarchismus
Berlin, Koln
The history of the liberative movement has not yet been filed sufficiently.
That is, mainly, due to the lack of scientists with interest in exploring this
area.Thanks to that, people who need bibliographic information for some speci-
fic themes of the history of anarchism, must go through all direct sources and
derive from those some conclusions.Things are more difficult in case modern
litterature is required, for the theory and practice of liberative movements,
which have appeared in the meantime.
The data bank of the the german speaking anarchism (DAtenbank des Deutsch-
sprachigen Anarchismus) is trying to cover the lack of bibliographic material.
Currently it files anarchistic or, generally, liberative documents and publi-
shes.Later it will comprehend documents which deal with the history and theory
of those movements.
We are focusing our compilation activities, to the german speaking areas
with the perspection of enhancing that shortly.In parallel we are elaborating
an introduction to the publishing history of the printed material, which will
be informative for their political and editorial meanings.
From the early 1980's, the filing of the german liberative press is open
for exploration.It covers the chronical period from the philosophic commence-
ments of the german anarchism, in the 1832, until nowadays.Strength of exrpes-
sion is given to newspapers and magazines, though collections of documents,
almanacs, year-books, congresses' protocols and catalogs are not omissioned.
Except of the anarchistic publishes we are also registering material whose
cooperatives or publishers were anarchists.The filing is achieved using all
the usual bibligraphical criterions (titles, publishers, date/district,
circulation, place of distribution et cetera).
In order to handle the increasing demands of the people who would like to
access our material, we decided to publish our first synthetic registers in a
series of brochures.This publication, in restricted copies and four or five
continuations, will be available at the "File of Social and Civilization Histo-
ry" of the 'Libertad' publications in Berlin.The first brochure, is occupied
with the german liberative press from 1832 to 1890.Every copy of this serial
includes a diagram of the press' history, chronological bibliography of the
magazines and an index.
We resume special researches through the data bank and we offer the results
printed.Until now we have filed over 1000 titles, which offer many different
elements for research each.
Da.d.A. is a private, research project.We do not accept donations from
state institutions and other similar organizations.In that way we can continue
our efforts undistracted and independent.The disadvantage is that we support
Da.d.A. with personal expenses and when we have free time available.
The modern liberative press is difficult to register and get filed.Although
liberative publications were developed in an unprecedented way (and not only
arithmetically) after 1968, few publications got access to libraries and files.
Especially today, we must tune up our practises in order to protect modern
press.We encourage every publisher of anarchistic material, even if productions
are seized nowadays, to send us information and, if possible, a copy of their
publications.They will get registered in our computer, filed in the library
for the Research of Social Demands, so that they will be accessible for studies
in the future.
For more information about the Da.d.A. project and the possibilities of
using the data bank, you can contact us in the following addresses:
BERLINER GESELLSCHAFT ZUM STUDIUM SOZIALER FRAGEN e.V.
Projekt: Datenbank des Deutschsprachigen Anarchismus (Da.d.A.)
c/o Jochen Schmuck c/o Gunter Hoering
Postfach 440 349 Pfalzer Str.27
1000 BERLIN 44 5000 KOLN 1
Tel. 030/686 65 24 Tel. 0221/21 81 49
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [6] Phortune 500 Returns!
By: The Renegade Chemist
Data Security Consultants, Inc./Online Services
==============================================================================
August 12, 1993
This is to let you know that the Phortune 500 Computing Posse has returned,
once again, accepting new members. Over the past years, we have had our
ups and downs, still putting out over twenty IBM PC compatible tutors and
utilities for today's telecommunications hobbyist.
These packages,including Code Thief [ALL VERSIONS AFTER v4 ARE *NOT* TRUE
VERSIONS -- SOME GROUPS TRIED TO "CLAIM" THEM AS THEIRS, BUT THEY ARE
MODIFIED ONLY IN TEXT, NOT IN CONTENT] and CNA Tools are widely used in
this community.
If you feel as though you have something to offer, read how we started
and decide if you wish to ride this new wave of information.
The Renegade Chemist
Data Security Consultants, Inc./Online Services
The Black Stone
[217] 544-9539
The Following is a reprint from Phrack Issue 11:
==============================================================================
==Phrack Inc.==
Volume Two/Issue Eleven
------------------------------------------------------------------------------
Phortune 500: Phreakdom's Newest Organization February 16, 1987
------------------------------------------------------------------------------
For those of you who are in the least bit interested, Phortune 500 is a group
of telecommunication hobbyists who's goal is to spread information as well as
further their own knowledge in the world of telecommunications. This new
group was formed by:
Brew Associates/Handsomest One/Lord Lawless/The Renegade Chemist
Quinton J. Miranda/Striker/The Mad Hacker/The Spiker
These eight members are also known as Board Of Directors (BOD). They don't
claim to be *Elite* in the sense that they are they world's greatest hackers,
but they ARE somewhat picky about their members. They prefer someone who
knows a bit about everything and has talents exclusive to him/herself.
One of the projects that Phortune 500 has completed is an individual password
AE type system. It's called TransPhor. It was written and created by Brew
Associates. It has been Beta tested on The Undergraduate Lounge (Sysoped by
Quinton J. Miranda). It is due to be released to the public throughout the
next few months.
Phortune 500 has been in operation for about 4 months, and has released two
newsletters of their own. The Phortune 500 Newsletter is quite like the
"People" of contemporary magazines. While some magazines cover the deep
technical aspects of the world in which we communicate, their newsletter tries
to cover the lighter side while throwing in information that they feel is "of
technical nature." The third issue is due to be released by the end of this
month.
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
*>=-> The Phortune 500 Computing Posse Membership Questionnaire
spyder%admiral.uucp@yale.edu
Egghead
ACiD CT Outpost
Adrenalin Member Board
Psychosis Eastern HQ
Paradigm Courier HQ
VGANSi Dist. Site
IIRG Distribution Site
CCiNet / ToXiCNet / InterPooL
IIRG Distribution Site 7: Lost Horizon BBS
ZyXEL 16.8k [v.32bis/v.42bis]
203.667.4953
Virulent Graffiti Distro Site
IIRG Distro Site
NO File Ratios
IIRG Distribution Site 8: Liquid Euphoria
Phalcon/Skism
Sysop: Hawkmoon
(914)-PRI-VATE
IIRG Distribution Site 9: The Black Lodge
LodgeNet Member Site
Sysop: The Brit
(5o8)-PRI-VATE
IIRG Distribution Site 11: Kaotic Attractor
Sysop: Mr Wyzard
(5o8)-PRI-VATE
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Section [10]: Phantasy Distribution Sites
Phantasy's Distribution Site's are continually growing,we apologize if you
called a board and didn't find the Mag. Network Distribution Sites will
have the Issues first, we suggest calling one of them if a problem does
arise.
1. Lightning Systems
(414) 363-4282
200 Million Bytes OnLine
USRobotics Dual Standard HST/V.32bis
2400 thru 14.4k v.32bis/HST
2. The Works BBS
Waffle Net v1.65
[617]/861-8976
3/12/24/96/14400b 7dy/24hr N,8,1
Lexington, MA
200 Megabytes of Storage
99.44% pure textfiles
Remote cDc Node (Very remote)
3. The Dickinson Nightlight
(713)-337-1452
Phantasy Distro Site
4. Abiogenesis,
3/12/24/96/14400 Practical Peripherals 14400FXSA
Fidonet 1:280/310.
Phone (816)734-4732
5. Uncensored Communications
Cybertek Magazine SIG
(914)-761-6877
6. Unauthorised Access Uk
Online 10.00pm-7.00am GMT
+44-(0)636-708063
3oo/12oo/24oo/96oo/14.4k HST
Established 1990
British Underground Guild WHQ
SysOp: Phantasm
Phantasy is also available on these systems,
Ripco II BBS The Hell Pit Pipers Pit BBS Cybernetic Violence
(312)-528-5020 (708)-459-7267 (203)-PRI-VATE (514)-PRI-VATE
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
Next Issue:
PHANTASY MAGAZINE SPECIAL ISSUE #20!!
Special Computer Security Issue
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
PHANTASY(C) IIRG 1991,1992,1993
May Odin Guide Your Way!
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
May You Be Feasting and Drinking in Valhalla For a Full Night
Before the Christian God Knows You're Dead
-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-